Git Mind is a WARP-native knowledge operating system for teams and autonomous agents. It models work as cryptographically causal graph entities (nodes/edges/properties), supports domain-specific workflows via extensions, and materializes human-readable artifacts (Markdown, HTML, PDF, etc.) on demand from graph state — at any point in time, for any observer/trust policy.
Source of truth is the graph, not checked-in files.
Git Mind is:
- A domain-agnostic knowledge graph engine
- A WARP-powered causal/provenance runtime
- An extension platform for domain workflows
- A materialization engine for file-like outputs without file-centric truth
- A trust-aware audit substrate (authorship, approvals, policy)
Git Mind is not:
- A generic note app
- A static markdown repo
- A thin wrapper over GitHub issues/docs
- A plugin free-for-all without deterministic contracts
Traditional tools separate planning, docs, tickets, architecture, and audit trails into disconnected silos. Git Mind unifies them into one causal graph where:
- Every fact has provenance.
- Every state is replayable.
- Every domain is an extension.
- Every document is materialized from graph truth.
- Every query can be observer- and trust-scoped.
- Cryptographic causal history
- Multi-writer/fork/merge semantics
- Time-travel and deterministic replay
- Observer-relative projections
- Trust-aware verification (approved authorship, delegation, revocation)
- Generic node/edge/property model
- Query engine
- View/lens composition
- Rule execution
- Materialization pipeline
Extensions declare domain semantics:
- Schemas (node/edge types)
- Views
- Lenses
- Rules
- Sync adapters
- Workflow actions
- Materializers/templates
Use Extensions as user-facing term (clear and product-friendly). Optionally keep "packs" as internal implementation name during migration.
- CLI:
git mind extension ... - Manifest:
extension.yaml - Registry: extension registry
- SDK: extension SDK
Examples:
- Roadmap workflow: task/feature/milestone graphs
- ADR workflow: decision nodes + rationale + consequences
- PR workflow: contributors/reviews/approvals/dependencies
- Incident workflow: timeline, blast radius, corrective actions
Any rich content (ADR body, spec text, policy memo, postmortem narrative) is stored as graph-linked content, not as canonical checked-in docs.
Content becomes:
- versioned
- provenance-backed
- observer-aware
- trust-filterable
- materializable on demand
Render graph state into:
- Markdown
- HTML
- JSON
- static site outputs
at:
- current head
- historical head (
--as-of) - specific observer/trust policy
For any node/edge/property:
- full mutation lineage
- causal ancestry
- author/trust chain
- policy/rule receipts
- "why this value?" explanation
With git-warp trust features:
- approved-authorship modes
- delegated trust
- revocation impact analysis
- trust-scoped views and rules
- signed evidence/certification outputs
Instead of writing ADRs in external docs:
1. Create ADR node:
git mind node add adr:0007 --type adr --title "Adopt extension runtime"2. Attach content directly to node (graph-backed CAS payload):
git mind content set adr:0007 --from ./adr-0007.md
# or interactive editor
git mind content edit adr:00073. Link to impacted architecture/tasks:
git mind edge add adr:0007 decides module:runtime
git mind edge add adr:0007 affects task:M114. Materialize when needed:
git mind materialize adr:0007 --format md --out ./dist/adr-0007.md
git mind materialize adr:0007 --format html --out ./dist/adr-0007.html
git mind materialize adr:0007 --format pdf --out ./dist/adr-0007.pdf5. Time travel:
git mind materialize adr:0007 --as-of main~30 --format mdSame node, many renderings, full provenance.
Pros:
- Native git primitive
- Easy inspection
- Familiar ecosystem
Cons:
- Scaling/format constraints
- Harder to enforce richer contracts
- Less control for advanced CAS policies
Pros:
- Content-addressed durability
- Natural dedupe/chunking potential
- Strong integrity linkage to WARP receipts
- Cleaner path for encryption/policy/capability controls
- Better for large/structured content evolution
Cons:
- More initial implementation work
- Needs good tooling for inspectability
- Canonical content store: git-cas-backed
- Optional import/export bridges for git notes interop
- Treat notes as compatibility channel, not primary substrate
Materialization should be explicit and reproducible.
- entityId or view
- asOf (rev/receipt/tick)
- observerContext
- trustPolicy
- extensionSet + lock
- template/profile
Every materialized artifact includes provenance header:
- graph head / frontier hash
- observer hash
- trust policy hash
- extension lock hash
- render hash
- timestamp of render (non-semantic metadata)
- Rendering must be deterministic given same semantic inputs
- Generated files are artifacts, not canonical truth
- Artifacts may be cached, always reproducible
- Generic graph operations
- Deterministic serialization and query execution
- Time-travel/as-of query semantics
- Fork/merge aware reasoning
- Extension manifest v1
- Registry/activation/deactivation
- Namespacing and collision policy
- Capability-scoped scripts (pure/effect)
- Extension compatibility checks
- Named views per extension
- Composable lenses (
view:a:b:c) - Cross-extension projections
- Causal/observer-aware filtering
- Rule execution with severities
- Doctor policy gates
- CI-ready contracts
- Trust policy integration
- Plan/apply split
- Idempotent sync receipts
- Source snapshot hashing
- Replayable ingest pipelines
- Entity-attached content bodies
- Rich metadata (mime, language, template hints)
- Multi-revision content lineage
- Content linking + embedding primitives
- Markdown/HTML/PDF/JSON renderers
- Template engine per extension
- Static site/export packs
- As-of materialization and comparison
- Holographic slice explorer
- trace/prove/certify commands
- Evidence bundles
- Chain-of-custody certificates
- Trust drift and revocation impact
- Observer profiles
- Observer diff / disagreement maps
- Rulial-distance metrics (operational v1)
- Policy simulation across historical windows
- Extension lockfile
- Signing/integrity policy
- Conformance test suite
- Maturity levels (experimental/stable/trusted)
- Extension spec v1
- Registry + namespaces
- Lens ABI
- Built-in domains migrated to extensions
- Contracts/schema lock
- Content subsystem (CAS-backed)
- ADR/doc workflows on nodes
- Materialize MD/HTML/PDF
- As-of rendering + reproducible headers
- Approved authorship integration
- Trust-aware views/rules
- Certify/evidence bundle workflows
- Revocation and policy simulation
- Extension marketplace/distribution
- Signed trusted extensions
- Federated multi-domain workflows
- Enterprise governance/audit suites
- Determinism > convenience
- Graph truth > file truth
- Extensions cannot bypass trust/provenance contracts
- Side effects always plan/apply
- Observer/trust context is explicit for materialization and views
- Every machine interface is schema-versioned
- Reproducibility requires extension lock + provenance envelope
# Extension lifecycle
git mind extension list
git mind extension add roadmap
git mind extension remove docs
git mind extension validate ./my-extension
# Content-on-node
git mind content set adr:0007 --from ./adr.md
git mind content edit adr:0007
git mind content show adr:0007 --as-of main~12
# Materialization
git mind materialize adr:0007 --format md --out ./dist/adr.md
git mind materialize view:roadmap --format html --out ./site/roadmap.html
git mind materialize adr:0007 --format pdf --as-of release/1.0
# Provenance/trust
git mind trace adr:0007 --property status
git mind prove adr:0007 --trust approved-only
git mind certify adr:0007 --bundle audit --out ./evidence/-
Choose canonical content store Recommend: git-cas-backed, with optional git-notes bridge.
-
Freeze extension manifest v1 Don't build runtime before spec discipline.
-
Define materialization contract v1 Input/output envelope + provenance headers.
-
Define content entity model Node-linked content object schema (revisioning, mime, origin, trust tags).
-
Decide observer/trust defaults Prevent hidden ambiguity in CLI behavior.
"Git Mind turns organizational knowledge into a verifiable causal graph. You work in domain workflows through extensions. You write decisions and specs directly to graph entities. Files are generated views, not source of truth. Everything is replayable, auditable, and trust-aware."
That's a category statement, not a feature list.